Machine learning has been playing an increasingly important role in information security and assurance. One of the areas of new applications is to design cryptographic systems by using chaotic neural network due to the fact that chaotic systems have several appealing features for information security applications. In this chapter, we describe a novel image encryption algorithm that is based on a chaotic cellular neural network. We start by giving an introduction to the concept of image encryption and its main technologies, and an overview of the chaotic cellular neural network. We then discuss the proposed image encryption algorithm in details, which is followed by a number of security analyses (key space analysis, sensitivity analysis, information entropy analysis and statistical analysis). The comparison with the most recently reported chaos-based image encryption algorithms indicates that the algorithm proposed in this chapter has a better security performance. Finally, we conclude the chapter with possible future work and application prospects of the chaotic cellular neural network in other information assurance and security areas.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alvarez G, Li S J (2006) Some basic cryptographic requirements for chaos-based crypto-systems. Int J Bifurcation Chaos 16:2129-2151
Amigo J M, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366: 211-216
Arthur T B, Kan Y (2001) Magic ‘squares’ indeed. Math Gazette 108:152-156
Baptista M S (1998) Cryptography with chaos. Phys Lett A 240:50-54
Behnia S, Akhshani A, Mahmodi H (2008) A novel algorithm for image encryption based on mixture of chaotic map. Chaos, Solitons, Fractals 35:408-419
Bourbakis N (1997) Image data compression encryption using G-SCAN pattern. Proc IEEE Conf SMC, 1117-1120
Bourbakis N, Alexopoulos C (1992) Picture data encryption using SCAN patterns. Pattern Recogn 25:567-581
Bourbakis N, Alexopoulos C (1999) A fractal based image processing language - formal modeling. Pattern Recogn 32:317-338
Chang H T (2004) Arbitrary affine transformation and their composition effects for two dimensional fractal sets. Image Vis Comput 22:1117-1127
Charilaos C, Athanassios S, Touradj E (2000) The JPEG2000 still image coding system. IEEE Trans Consum Electron 46:1103-1127
Chen G R, Mao Y B, Chui C K (2004) A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons, Fractals 21:749-761
Chen H Z, Dai M D, Wu X Y (1994) Bifurcation and chaos in discrete-time cellular neural networks. 3rd IEEE Int Wkshp Cellular Neural Networks and Their Applicat, CNNA '94, 309-315
Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Sig Proc 48:2439-2451
Chua L O, Hasler M, Moschytz G S (1995) Autonomous cellular neural networks: a unified paradigm for pattern formation and active wave propagation. IEEE Trans Circ Syst I 42:559-577
Chua L O, Yang L (1988a) Cellular neural network: theory. IEEE Trans Circ Syst 35:1257-1272
Chua L O, Yang L (1988b) Cellular neural network: applications. IEEE Trans Circ Syst 35:1273-1290
Clarke R J (1995) Digital compression of still images and video. Academic Press, New York
Cox I J, Kilian J, Leighton F T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673-1687
Csapodi M, Vandewalle J, Roska T (1998) High speed calculation of cryptographic hash functions by CNN Chips. 1998 Fifth IEEE Int Wkshp Cellular Neural Networks and Their Applicat, CNNA '98, 14-17
Dang P P, Chau P M (2000) Image encryption for secure Internet multimedia applications. IEEE Trans Consum Electron 46:395-403
Fan Z, Josef A N (1991) A chaotic attractor with cellular neural networks. IEEE Trans Circ Syst 38:811-812
Fridrich J (1997) Image encryption based on chaotic maps. Proc IEEE Int Conf Syst Man Cybern, 1105-1110
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259-1284
Gao H J, Zhang Y S, Liang S Y (2006) A new chaotic algorithm for image encryption. Chaos, Solitons, Fractals 29:393-399
Gao Q, Moschytz G S (2004) Fingerprint feature matching using CNNs. Proc 2004 Int Symp Circ Syst 3:73-76
Gao T G, Chen Z Q (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394-400
Goedgebuer J P, Levy P, Larger L (2002) Optical communication with synchronized hyperchaos generated electro optically. IEEE J Quantum Electron 38:1178-1183
Guzman J, Astrom K J, Dormido S (2008) Interactive learning modules for PID control. IEEE Contr Syst Mag 28:118-134
He Z, Li K (2000) TDMA secure communication based on synchronization of Chua's circuits. J Circ Syst Comp, 10:147-158
He Z Y, Zhang Y F, Lu H T (1999) The dynamic character of cellular neural network with applications to secure communication. J Chin Inst Commun 20:59-67
Jessl J, Bertram M, Hagen H (2005) Web-based progressive geometry transmission using subdivision-surface wavelets. Proc 10th Int Conf 3D Web Technol, 29-35
Kocarev L (2001) Chaos-based cryptography: A brief overview. IEEE Circ Syst Mag 1:6-21
Kocarev L, Jakimoski G (2001) Logistic map as a block encryption algorithm. Phys Lett A 289:199-206
Lai X J, Massey J L (1990) A proposal for a new block encryption standard. Adv in Cryptology-EUROCRYPT'90, Springer-Berlin, LNCS 473:389-404
Lee J W, Giraud-Carrier C (2007) Transfer Learning in Decision Trees. 2007 Int Joint Conf Neural Networks, 726-731
Li P, Li Z, Halang W A (2007) A stream cipher based on a spatiotemporal chaotic system. Chaos, Solitons, Fractals 32:1867-1876
Li S J, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Int Symp Circ Syst 2:26-29
Li Z G, Li K, Wen C Y (2003) A new chaotic secure communication system. IEEE Trans Commun 51:1306-1312
Li X B, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recogn Lett 18: 1253-1259
Lian S G, Wang Z Q, Li Z X (2004) Secure multimedia encoding schemes based on quad-tree structure. J Image and Graphics 9:353-359
Maniccam S S, Bourbakis N (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37:725-737
Martin K, Lukac R, Plataniotis K N (2005) Efficient encryption of compressed color images. Proc IEEE Int Symp Ind Electron 3:1245-1250
Mascolo S, Grassi G (1998) Observers for hyperchaos synchronization with application to secure communications. Proc IEEE Int Conf Control App 2:1016-1020
Masuda N, Aihara K (2002) Cryptosystems with discretized chaotic maps. IEEE Trans Circ Syst I 49:28-40
Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia XIII:29-42
Mozina M, Zabkar J, Bratko I (2007) Argument based machine learning. Artificial Intelligence 171:922-937
Parberry I (1997) An efficient algorithm for the Knight's tour problem. Discrete Appl Math 73:251-260
Pareek N K, Patidar V, Sud K K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926-934
Parker A T, Short K M (2001) Reconstructing the keystream from a chaotic encryption scheme. IEEE Trans Circ Syst I 48:104-12
Pecora L M, Carroll T L (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821-824
Pecora L M, Carroll T L (1991) Driving systems with chaotic signals. Phys Rev A 44:2374-2383
Perez G, Cerdeira H A (1995) Extracting messages masked by chaos. Phys Rev Lett 74:1970-1973
Pisarchik A N, Flores-Carmona N J, Carpio-Valadez M (2006) Encryption and decryption of images with chaotic map lattices. Chaos 6:033118.1-033118.6
Qiu S H, Ma Z G (2003) An image cryptosystem based on general cat map. J Commun Chin 24:51-57
Radha H, Vetterli M, Leonardi R (1996) Image compression using binary space partitioning trees. IEEE Trans Image Process 5:1610-1624
Rhouma R, Meherzi S, Belghith S (2008) OCML-based colour image encryption. Chaos, Solitons Fractals doi:10.1016/j.chaos.2007.07.083
Rivest R L, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21:120-126
Scharinger J (1998) Fast encryption of image data using chaotic Kolmogorov flows. J Electron Imaging 7:318-325
Schneier B (1996) Applied Cryptography (2nd edn). John Wiley & Sons Press, New York
Shannon C E (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656-715
Shiang H P, Tu W, van der Schaar M (2008) Dynamic Resource Allocation of Delay Sensitive Users Using Interactive Learning over Multi-Carrier Networks. 2008 IEEE Int Conf Commun, 2502-2506
Slavova A (1998) Dynamic properties of cellular neural networks with nonlinear output function. IEEE Trans Circ Syst I 45:587-590
Su T J, Du Y Y, Cheng Y J et al (2005) A fingerprint recognition system using cellular neural networks. 9th Int Wkshp Cellular Neural Networks App, 170-173
Quattoni A, Collins M, Darrell T (2008) Transfer learning for image classification with sparse prototype representations. 2008 IEEE Conf Comp Vis and Pattern Recogn, 1-8
Vladimir S U, Jean-Pierre G, Laurent L (2001) Communicating with optical hyperchaos: information encryption and decryption in delayed nonlinear feedback systems. Phys Rev Lett 86:1892-1895
Wong K W (2003) A combined chaotic cryptographic and hashing scheme. Phys Lett A 307:292-298
Wolf A, Swift J B, Swinney H L (1985) Detecting Lyapunov Exponents from a Time Series. Physica D 16:285-317
Yang T, Lin B Y, Chun M Y (1998) Application of neural networks to unmasking chaotic secure communication. Physica D, 124:248-257
Yang T, Wu C W, Chua L O (1997) Cryptography based on chaotic systems. IEEE Trans Circ Syst I 44:469-472
Yang Z X, Karahoca A (2006) An anomaly intrusion detection approach using cellular neural networks. Comput Inf Sci - ISCIS'06, Springer-Berlin, LNCS 4263:908-917
Yen J C, Guo J I (2000) A new chaotic key-based design for image encryption and decryption. Proc IEEE Int Conf Circ Syst 4:49-52
Zhang W, Peng J, Yang H Q (2005) A digital image encryption scheme based on the hybrid of cellular neural network and logistic map. Adv Neural Networks, ISNN'05, Springer-Berlin, LNCS 3497:860-867
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Peng, J., Zhang, D. (2009). Image Encryption and Chaotic Cellular Neural Network. In: Machine Learning in Cyber Trust. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88735-7_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-88735-7_8
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88734-0
Online ISBN: 978-0-387-88735-7
eBook Packages: Computer ScienceComputer Science (R0)